Question No: 361 – (Topic 3)

Victor works as a professional Ethical Hacker for SecureEnet Inc. He wants to scan the wireless network of the company. He uses a tool that is a free open-source utility for network exploration.

The tool uses raw IP packets to determine the following:

What ports are open on our network systems

What hosts are available on the network

Identify unauthorized wireless access points

What services (application name and version) those hosts are offering

What operating systems (and OS versions) they are running

What type of packet filters/firewalls are in use Which of the following tools is Victor using?

Nmap

Sniffer

Kismet

Nessus

Answer: A

Question No: 362 – (Topic 3)

In which of the following Person-to-Person social engineering attacks does an attacker pretend to be an outside contractor, delivery person, etc., in order to gain physical access to the organization?

In person attack

Third-party authorization attack

Important user posing attack

Impersonation attack

Answer: D

Question No: 363 – (Topic 3)

Which type of virus is able to alter its own code to avoid being detected by anti-virus software?

Macro

Polymorphic

Logic Bomb

Boot sector

Answer: B

Question No: 364 – (Topic 3)

Rick is a project manager of a construction project. He is aggregating the estimated costs of individual activities or work packages to establish a cost baseline. In which of the following Project Management Knowledge Areas is he working on?

Project Cost Management

Project Integration Management

Project Time Management

Project Scope Management

Project Quality Management

Answer: A

Question No: 365 – (Topic 3)

Which of the following uses public key cryptography to encrypt the contents of files?

NTFS

DFS

RFS

EFS

Answer: D

Question No: 366 – (Topic 3)

Complete the following sentence: Quality control is a(n) process while quality assurance is a(n) process.

Which of the following testing methodologies is we-are-secure.com using to test the security of its network?

Blackbox

Alpha testing

Whitebox

Graybox

Answer: C

Question No: 368 – (Topic 3)

Which of the following statements about Secure Shell (SSH) are true? Each correct answer represents a complete solution. Choose three.

It is the core routing protocol of the Internet.

It was designed as a replacement for TELNET and other insecure shells.

It is a network protocol used primarily on Linux and Unix based systems.

It allows data to be exchanged using a secure channel between two networked devices.

Answer: B,C,D

Question No: 369 – (Topic 3)

Tim is working as a project manager for the TCH project. The project is in the final stages and the closing processes are being performed. He has prepared the lessons learned document. This document will be the part of .

The project#39;s performance record

The project charter

The risk register

The company#39;s organizational process assets

Answer: D

Question No: 370 – (Topic 3)

You are a project manager for a recycling company. You are in the process of reviewing proposals from sellers for recycling equipment. You notice the scope statement states the company required to abide by the environmental agencies regulations regarding waste. As a result, you select proposals that automatically include features such as scrubbers and baghouses to reduce hazardous waste. Which of the following is true regarding the scope statement?

It includes an introductory schedule management plan.

Knowing the limits and the projects required helps determine the resources to purchase.

It is a deliverable-oriented collection of project components.

It is the methods and procedures an organization must follow to create the activity list.